MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
security
Search

PC / Tech. > eWeek

Thursday April 25, 2019. 03:41 PM
Researchers from the Unit 42 threat intelligence team at Palo Alto Networks discovered a vast network of scam affiliate marketing sites that were using subdomains set up on compromised GoDaddy users accounts.
    0
Researchers from the Unit 42 threat intelligence team at Palo Alto Networks discovered a vast network of scam affiliate marketing sites that were using subdomains set up on compromised GoDaddy users accounts.
    0
NEWS ANALYSIS: Cyber-criminals are getting better at finding ways to extract large sums of money from companies through the use of email and phishing attacks.
    0
NEWS ANALYSIS: Cyber-criminals are getting better at finding ways to extract large sums of money from companies through the use of email and phishing attacks.
    0
NEWS ANALYSIS: Cyber-criminals are getting better at finding ways to extract large sums of money from companies through the use of email and phishing attacks.
    0
NEW-PRODUCT NEWS: Slack unwrapped several new features at its annual Frontiers conference, including the new no-code Workflow Builder and the ability for traditional email users to participate in Slack messaging.
    0
NEW-PRODUCT NEWS: Slack unwrapped several new features at its annual Frontiers conference, including the new no-code Workflow Builder and the ability for traditional email users to participate in Slack messaging.
    0
NEW-PRODUCT NEWS: Slack unwrapped several new features at its annual Frontiers conference, including the new no-code Workflow Builder and the ability for traditional email users to participate in Slack messaging.
    0
eWEEK is building a new IT products and services section that encompasses most of the categories that we cover on our site. In it, we will spotlight the leaders in each sector, which include enterprise software, hardware, security, on-premises-based systems and cloud...
    2
eWEEK is building a new IT products and services section that encompasses most of the categories that we cover on our site. In it, we will spotlight the leaders in each sector, which include enterprise software, hardware, security, on-premises-based systems and cloud...
    1
eWEEK is building a new IT products and services section that encompasses most of the categories that we cover on our site. In it, we will spotlight the leaders in each sector, which include enterprise software, hardware, security, on-premises-based systems and cloud...
    1
Wednesday April 24, 2019. 04:51 PM
Flashpoint is adding new visibility for dark web account and card store data alongside an enhanced dashboard in an effort to deliver actionable intelligence that advances the state of security.
    2
Flashpoint is adding new visibility for dark web account and card store data alongside an enhanced dashboard in an effort to deliver actionable intelligence that advances the state of security.
    0
Flashpoint is adding new visibility for dark web account and card store data alongside an enhanced dashboard in an effort to deliver actionable intelligence that advances the state of security.
    1
eWEEK DATA POINTS: Machine learning and artificial intelligence can be hard terms to define, so how does this play into security product marketing? Are the terms being oversold--or undersold--to potential buyers? Here are some suggestions on what questions to ask security...
    0
eWEEK DATA POINTS: Machine learning and artificial intelligence can be hard terms to define, so how does this play into security product marketing? Are the terms being oversold--or undersold--to potential buyers? Here are some suggestions on what questions to ask security...
    1
eWEEK DATA POINTS: Machine learning and artificial intelligence can be hard terms to define, so how does this play into security product marketing? Are the terms being oversold--or undersold--to potential buyers? Here are some suggestions on what questions to ask security...
    0
Tuesday April 23, 2019. 08:33 PM
VMware is including the Pod Security Policy capability, which is still considered to be a beta feature in the open-source Kubernetes cloud-native container orchestration project, as a supported component in its enterprise-grade Kubernetes platform.
    0
VMware is including the Pod Security Policy capability, which is still considered to be a beta feature in the open-source Kubernetes cloud-native container orchestration project, as a supported component in its enterprise-grade Kubernetes platform.
    0
VMware is including the Pod Security Policy capability, which is still considered to be a beta feature in the open-source Kubernetes cloud-native container orchestration project, as a supported component in its enterprise-grade Kubernetes platform.
    0
News copyright owned by their original publishers | Copyright © 2004 - 2019 Zicos / 440Network
Current Date
May, Tue 21 - 11:25 CEST